This Election Hacking episode will explore the recent wave of SIM swap attacks in the context of MFA compromise, account hijacking and data theft ahead of the 2020 election.

Can SIM swapping be used to target and steal identities of high-value individuals in the 2020 elections (e.g. campaign staff, influencers, local election officials)?

Join this panel to learn more about:
- Why attackers are focusing on identities
- SIM swap attacks and two-factor authentication
- Phishing - most commonly used for SIM swapping
- Other ways attackers can get the victim's info
- What can be done to protect digital identities
- Early SIM-swapping attack warning signs

This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.

Crippling ransomware attacks are on the rise and U.S. cities are falling victim at alarming rates. The public sector is especially vulnerable because state and local governments tend to have outdated computer systems and maintain sensitive data which is highly desirable to attackers.

Join this episode of the Election Hacking series to learn more about the ransomware threat to state and local governments and what this means for the 2020 U.S. presidential election.
- The year of ransomware
- How cities and states are coping with the scourge of ransomware
- The ransomware dilemma: Pay the ransom or fight the infection
- How AI is enabling - and helping fight - ransomware attacks
- Ransomware as a threat to democracy

This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.

With the 2020 U.S. presidential election on the horizon, what are the biggest cybersecurity threats our democracy is facing? How well is the election infrastructure prepared when it comes to cybersecurity, and what are some steps to take today to strengthen the security posture?

Join this panel to learn more about:
- The current government threat landscape
- Which threats can we expect to see in the next few months?
- Why visibility into the security posture of election infrastructure is key
- What's needed to ramp up security quickly?
- Recommendations for enhancing election security

This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.

AI-generated fake videos, or deepfakes, are becoming more common, more convincing and easier to create. In the era of social, technically manipulated videos can spread like wildfire.

This is a particularly sensitive issue in today's politically charged environment. With the 2020 U.S. presidential election on the horizon, foreign interference in elections is a real problem and social media the perfect gateway for sowing misinformation, discord and mistrust.

Can deepfakes impact the outcome of elections? How easy are they to spot, and do you need a tool for that?

Join this episode of the Election Hacking series to learn more about the emergence of deepfakes and what can be done to mitigate its impact on elections.
- The current state of deepfakes
- How deepfakes can be used in misinformation campaigns
- Use of deepfakes in cyber crime
- Social media and the spread of fake videos
- How tech companies are addressing the scourge of deepfakes (Facebook, Twitter, YouTube)

This episode is part of the Election Hacking Original series examining the threats to democratic elections, the technologies used to power and hijack elections, and what's needed to educate and empower voters before Election Day.

The inaugural episode of the Election Hacking series will introduce the topic of who, how and why the upcoming 2020 election will be hacked.

Join this interactive Q&A session to learn more about election hacking, its impact, the various stakeholders, and what if anything, can be done.

Our unique panel of individuals will bring diverse perspectives to this topic.

- Cameron Koffman, who, if elected, would be the youngest candidate since Theodore Roosevelt running for the NY State Assembly
- Tinatin Japaridze, former United Nations correspondent for the Russian and Ukrainian media, with expertise in bi-lateral US-Russian relations on cyber security.
- Lance James, CEO of Unit 221B and noted cyber security expert who has assisted various law enforcement and government agencies on some of the most highly publicized hacking investigations.

The emerging DataOps is not Just DevOps for Data. According to Gartner, DataOps is a collaborative data management practice focused on improving the communication, integration and automation of data flows between data managers and consumers across an organization.

The goal of DataOps is to create predictable delivery and change management of data, data models and related artifacts. DataOps uses technology to automate data delivery with the appropriate levels of security, quality and metadata to improve the use and value of data in a dynamic environment.

With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.

This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.

Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.

This Session will be the first in a series on Threat Hunting. This kick-off session will introduce the concept of Threat Hunting as there is a lot of confusion about this important activity. Specifically, we will cover what it is, how it is performed, its’ role and some of the best Tools to use as a Threat Hunter.

The upcoming PCI DSS version 4.0 will include many new or revised requirements and compensating controls will be removed It will include support for a range of evolving payment environments, technologies, and methodologies for achieving security. PCI DSS v4.0 further supports the use of different new technologies. The new validation option gives organizations the flexibility to take a customized approach to demonstrate how they are meeting the security intent of each PCI DSS requirement. This customized approach supports organizations using security approaches that may be different than traditional PCI DSS requirements.

Through customized validation, entities can show how their specific implementation meets the intent and addresses the risk. Unlike compensating controls, customized validation will not require a business or technical justification for meeting the requirements using alternative methods, as the requirements will now be outcome-based.

This session will cover why State and Local Governments have headed the list of Ransomware Attacks. Part 1 will delve into why is this the case and Part 2 will address what can be done to prevent these attacks.

This session will delve into the legal responsibilities of your Bank's liability and your requirements to protect your banking credentials from the unauthorized transfer of funds as a result of a hack.

Tune in for this live interview with Graeme Payne, former VP and CIO for Global Corporate Platforms at Equifax. This session will give you first hand insights into what happened at Equifax, and lessons learned.

This session will take a practical approach to IT risk management and discuss multi cloud, Verizon Data Breach Investigations Report (DBIR) and how Enterprises are losing ground in the fight against persistent cyber-attacks. We simply cannot catch the bad guys until it is too late. This picture is not improving. Verizon reports concluded that less than 14% of breaches are detected by internal monitoring tools.

We will review the JP Morgan Chase data breach were hackers were in the bank’s network for months undetected. Network configuration errors are inevitable, even at the largest banks as Capital One that recently had a data breach where a hacker gained access to 100 million credit card applications and accounts.

Viewers will also learn about:
- Macro trends in Cloud security and Micro trends in Cloud security
- Risks from Quantum Computing and when we should move to alternate forms of encryption
- Review “Kill Chains” from Lockhead Martin in relation to APT and DDoS Attacks
- Risk Management methods from ISACA and other organizations

Speaker: Ulf Mattsson, Head of Innovation, TokenEx

----------------------------------------
Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU

How should we prepare for this new brave world where many 3rd party security providers disappeared into cloud providers? This will greatly impact many 3rd party security vendors, organizations and investors.

Cloud transformations are accelerating. By 2020, cloud will increase by 157% and on-premises ’traditional’ IT infrastructure will decrease by 54%, according to 452 Research, 2018.

With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

Join this webinar to learn more about:
- Data Protection solutions for the enterprise
- Trends in Data Masking, Tokenization and Encryption
- New Data Protection Standards from ISO and NIST
- The new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds
- The llatest developments in IAM technologies and authentication

----------------------------------------
Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU

The Cybersecurity- No Spin Zone is dedicated first and foremost to educating viewers about Cybersecurity Technologies, Problems, Compliance and Legal FACTS. We are not a Vendor Sponsored Channel, this gives us the unique ability to bring you factual unbiased information and advice from subject matter experts.